1st International ICST Workshop on Multimedia Security in Communication

Research Article

Construction and Usage of Time-limited Keys in Secure Multimedia Distribution

  • @INPROCEEDINGS{10.1109/CHINACOM.2008.4685258,
        author={Markus Dunte and Christoph Ruland},
        title={Construction and Usage of Time-limited Keys in Secure Multimedia Distribution},
        proceedings={1st International ICST Workshop on Multimedia Security in Communication},
        publisher={IEEE},
        proceedings_a={MUSIC},
        year={2008},
        month={11},
        keywords={H.264 MPEG-4 SVC scalable coding time-limited keys key generation},
        doi={10.1109/CHINACOM.2008.4685258}
    }
    
  • Markus Dunte
    Christoph Ruland
    Year: 2008
    Construction and Usage of Time-limited Keys in Secure Multimedia Distribution
    MUSIC
    IEEE
    DOI: 10.1109/CHINACOM.2008.4685258
Markus Dunte1,*, Christoph Ruland1,*
  • 1: University of Siegen Institute for Data Communications Systems 57076 Siegen, Germany
*Contact email: markus.dunte@uni-siegen.de, christoph.ruland@uni-siegen.de

Abstract

If the results of the latest studies for Internet usage are to be belived, worldwide 12 million TV consumers will be using Internet Protocol TV (IPTV) instead of the traditional TV broadcasting by the year 2010. These figures were published by ABI Research in 2006. Furthermore, analysts of Informa Telecoms & Media are forecasting the worldwide grow in revenue of IPTV to be ten billion dollar by 2010. The revolution that is described by these figures implies on the one hand an enormouse increase in sales values but on the other hand causes problems in handling the data volume. Moreover, IPTV will be attracting criminal attacks like Pay-TV has in traditional broadcasting. Therfore, not only effecient encoding of media data has to be applied to save transmission capacity but also security mechanisms should be established to prevent unauthorised access. This paper will give a short overview of possible infrastructure setup as well as a method for the use of time-limited keys.